Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Пособие ФИБ 2010 3 курс.doc
Скачиваний:
5
Добавлен:
03.11.2018
Размер:
1.19 Mб
Скачать

6. Answer the questions

What is firewall?

How are the firewalls classified?

Which firewall is considered to be not very efficient and expensive?

Which firewall has most advantages?

Which two methods of traffic filtering are mentioned in the text?

What is Transport Data Interface?

How does application program receive information about blocked packets?

7. Write if the following statements are true or false.

1. Firewalls monitor the information in the Internet and control its passing.

2. The most efficient classification of firewalls is one by implementation.

3. Session layer gateway is the most expensive system of information protection.

4. But session layer gateway is unable to protect new network services.

5. Application layer server is characterized as low effective.

6. The cheapest system is packet filtering.

7. The system of packet filtering operates the information about IP-address, source and destination port numbers, flags in its work.

8. The most serious problem for personal computer is visibility of net configuration from the internet during packet filtering.

9. The main idea of information protection in the Internet is to control of access to internet-resources.

10. TDI-filter intercepts all addresses to original TCP driver and stores information about all connections.

Vocabulary tasks

8. Give as many word combinations as possible and translate them.

Layer

9. What do the following abbreviations from Text 1 mean?

IP, TDI, TCP, ICS

10. Give your definitions of the following terms.

Function layer, packet filtering

11. Make the word combinations.

1. packet

a) firewall

2. filtering

b) proceeding

3. information

c) address

4. traffic

d) configuration

5. session layer

e) hub

6. outside

f) outflow

7. functional

g) gateway

8. distributed

h) rules

9. net

i) filtering

10. IP

j) layer

12. Translate into Russian the following passage.

When a user downloads a virus, worm or Trojan (or it penetrates a gateway security device), intrusion detection systems (IDSs) can issue alerts about those attacks and intrusion prevention systems (IPSs) can block them—if you have enough confidence in the detection signature and if these in-line devices are on the same segment as the security breach. However, these solutions don’t effectively address non-signature threats or mitigate a network-wide outbreak.

Furthermore, a greater threat to businesses is posed by non-signature-based malicious or accidental threats such as multiple files sent to an outside e-mail address by an employee preparing to resign or music file sharing that not only uses corporate assets but also opens that employee’s entire C: drive. These are much harder to detect and defend against.

Another area of continued concern for enterprises is the loss of intellectual property and customer record data.

Recognizing the need to protect business assets, almost 38% of large enterprises have deployed intellectual property protection solutions. According to the Yankee Group 2005 Security Leaders and Laggards Survey, another 39% plan to deploy within the next 12 months, which indicates users’ willingness to try new methods to resolve their security issues.

Network behavior analysis (NBA) systems not only help to proactively prevent internal security threats, they also offer protection against misuse of business resources. The technology complements IDS and IPS signature-based threats: The IDS lets IT staff know what threats made it through the firewall, while the IPS goes a step further and can block many attack attempts. NBA monitors inappropriate access, file sharing and other unusual activity such as more transfers of account records than usual.